CEH Certified Ethical Hacker All-in-One Exam Guide, Fourth Edition

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

CEH

Author(s): Matt Walker
Series: All-in-one
Year: 2019

Language: English
Pages: 607

Title Page......Page 2
Copyright Page......Page 3
Dedication......Page 5
Contents at a Glance......Page 8
Contents......Page 9
Acknowledgments......Page 14
Introduction......Page 16
Chapter 1 Getting Started: Essential Knowledge......Page 24
Essentials......Page 25
Security Basics......Page 37
Hacking Terminology......Page 47
The Ethical Hacker......Page 54
Chapter Review......Page 61
Questions......Page 65
Answers......Page 67
Footprinting......Page 69
Passive Footprinting......Page 72
Active Footprinting......Page 74
Search Engines......Page 75
Website and E-mail Footprinting......Page 83
DNS Footprinting......Page 85
Network Footprinting......Page 96
Other Tools......Page 99
Chapter Review......Page 101
Questions......Page 103
Answers......Page 105
Chapter 3 Scanning and Enumeration......Page 107
TCP/IP Networking......Page 108
Subnetting......Page 116
Scanning Methodology......Page 121
Identifying Targets......Page 122
Port Scanning......Page 127
Evasion......Page 138
Vulnerability Scanning......Page 142
Windows System Basics......Page 144
Enumeration Techniques......Page 147
Chapter Review......Page 153
Questions......Page 158
Answers......Page 161
Essentials......Page 163
Network Knowledge for Sniffing......Page 164
Active and Passive Sniffing......Page 176
Sniffing Tools and Techniques......Page 177
Techniques......Page 178
Tools......Page 182
Devices Aligned Against You......Page 187
Evasion Techniques......Page 195
Chapter Review......Page 202
Questions......Page 206
Answers......Page 208
Chapter 5 Attacking a System......Page 210
Windows Security Architecture......Page 211
Linux Security Architecture......Page 220
Methodology......Page 224
Hacking Steps......Page 226
Authentication and Passwords......Page 227
Privilege Escalation and Executing Applications......Page 236
Hiding Files and Covering Tracks......Page 239
Chapter Review......Page 246
Questions......Page 249
Answers......Page 251
Chapter 6 Web-Based Hacking: Servers and Applications......Page 253
Web Organizations......Page 254
Attack Methodology......Page 258
Web Server Architecture......Page 260
Web Server Attacks......Page 267
Attacking Web Applications......Page 273
Application Attacks......Page 274
Countermeasures......Page 287
Chapter Review......Page 288
Questions......Page 292
Answers......Page 294
Chapter 7 Wireless Network Hacking......Page 296
Wireless Terminology, Architecture, and Standards......Page 297
Wireless Hacking......Page 306
Chapter Review......Page 316
Questions......Page 318
Answers......Page 320
Chapter 8 Mobile Communications and the IoT......Page 322
Mobile Vulnerabilities and Risks......Page 323
Mobile Platforms and Attacks......Page 327
IoT......Page 334
IoT Architecture......Page 335
IoT Vulnerabilities and Attacks......Page 337
IoT Hacking Methodology......Page 340
Chapter Review......Page 344
Questions......Page 348
Answers......Page 350
Cloud Computing......Page 352
Cloud Security......Page 358
Threats and Attacks......Page 362
Chapter Review......Page 365
Questions......Page 368
Answers......Page 370
Chapter 10 Trojans and Other Attacks......Page 371
The “Malware” Attacks......Page 372
Trojans......Page 374
Viruses and Worms......Page 379
Remaining Attacks......Page 386
Denial of Service......Page 387
Session Hijacking......Page 391
Chapter Review......Page 396
Questions......Page 401
Answers......Page 403
Chapter 11 Cryptography 101......Page 405
Cryptography and Encryption Overview......Page 406
Encryption Algorithms and Techniques......Page 407
PKI, the Digital Certificate, and Digital Signatures......Page 419
The PKI System......Page 420
Digital Certificates......Page 422
Digital Signatures......Page 426
Encrypted Communication and Cryptography Attacks......Page 427
Encrypted Communication......Page 430
Cryptography Attacks......Page 436
Chapter Review......Page 438
Questions......Page 441
Answers......Page 444
Chapter 12 Low Tech: Social Engineering and Physical Security......Page 446
Social Engineering......Page 447
Human-Based Attacks......Page 448
Computer-Based Attacks......Page 455
Mobile-Based Attacks......Page 462
Physical Security......Page 463
Physical Security 101......Page 464
Chapter Review......Page 470
Questions......Page 472
Answers......Page 474
Chapter 13 The Pen Test: Putting It All Together......Page 476
The Security Assessments......Page 477
Security Assessment Deliverables......Page 487
Guidelines......Page 488
More Terminology......Page 489
Chapter Review......Page 490
Questions......Page 492
Answers......Page 493
Vulnerability Research Sites......Page 495
Footprinting Tools......Page 496
Scanning and Enumeration Tools......Page 498
System Hacking Tools......Page 502
Cryptography and Encryption......Page 505
Wireless......Page 507
Mobile and IoT......Page 509
Trojans and Malware......Page 511
Web Attacks......Page 512
Miscellaneous......Page 513
Tools, Sites, and References Disclaimer......Page 514
Single User License Terms and Conditions......Page 515
Technical Support......Page 517
Glossary......Page 518
Index......Page 550